Advances, Systems and Applications
From: Identity-based remote data checking with a designated verifier
Protocol | DOtoCSP | DVtoCSP | CSPtoDV |
---|---|---|---|
Our Protocol | \((n+1)\cdot |\mathbb G_{1}|+\lambda +|T_{Fid}|\) | \(2\cdot |n|+|\mathbb Z_{q}^{*}|\) | \(2\cdot |\mathbb G_{1}|+|T_{Fid}|+|\mathbb Z_{q}|\) |
Li et al. [8] | \((n+2)\cdot |\mathbb G_{1}|+\lambda +|T_{Fid}|\) | \(2\cdot |n|+|\mathbb Z_{q}^{*}|\) | \(4\cdot |\mathbb G_{1}|+|T_{Fid}|+|\mathbb Z_{q}|\) |
Yu et al. [9] | \((n+1)\cdot |\mathbb G_{1}|+\lambda +|T_{Fid}|\) | \(|\mathbb G_{1}|+|\mathbb G_{2}|+\ell \cdot (|n|+|\mathbb Z_{q}^{*}|)+|pf|\) | \(|\mathbb G_{1}|+|T_{Fid}|+|\mathbb G_{2}|\) |
Ji et al. [4] | \(n\cdot (\lambda +|n|+|\mathbb G_{1}|)\) | \(\ell \cdot (|n|+|\mathbb Z^{*}_{q}|)\) | \(3|\mathbb G_{1}|+|T_{Fid}|\) |